Exploring and enforcing security guarantees via program dependence graphs.
Andrew JohnsonLucas WayeScott MooreStephen ChongPublished in: PLDI (2015)
Keyphrases
- information security
- security requirements
- access control
- security policies
- graph theory
- information assurance
- security issues
- network security
- computer programs
- graph theoretic
- intrusion detection
- statistical databases
- security problems
- graph matching
- graph model
- database
- random walk
- functional requirements
- security management
- graph databases
- security level
- computer security
- bayesian networks